SHA256
1
0
forked from pool/freerdp

Accepting request 415579 from home:zhangxiaofei:branches:X11:RemoteDesktop

format changelog

OBS-URL: https://build.opensuse.org/request/show/415579
OBS-URL: https://build.opensuse.org/package/show/X11:RemoteDesktop/freerdp?expand=0&rev=52
This commit is contained in:
Bruno Friedmann 2016-07-28 11:25:48 +00:00 committed by Git OBS Bridge
parent eed81b0ec0
commit 992fce7deb

View File

@ -6,24 +6,28 @@ Wed May 18 08:44:26 UTC 2016 - jengelh@inai.de
-------------------------------------------------------------------
Tue May 17 10:25:00 UTC 2016 - fezhang@suse.com
- Update to GNOME 3.20.2 FATE#318572
- Add obs git integration.
- Update to version 2.0.0git.1463131968.4e66df7:
+ Fixed memory leaks.
+ wfreerdp: fix name build without client interface
+ libfreerdp-codec: fix xcrush decompression, revert remote control fix
+ KB3153731: May 2016 DST update for Azerbaijan, Chile, Haiti and Morocco
+ libfreerdp-codec: fix xcrush decompression, revert remote
control fix
+ KB3153731: May 2016 DST update for Azerbaijan, Chile, Haiti and
Morocco
+ libfreerdp-codec: make proper xcrush context reset fix
-------------------------------------------------------------------
Wed May 4 12:06:22 UTC 2016 - fezhang@suse.com
- Update to version 2.0.0, git master branch id a7ca42e (FATE#319661),
no upstream changelog available.
- Update to version 2.0.0, git master branch id a7ca42e
(FATE#319661), no upstream changelog available.
* Warning: This is a git snapshot regarded as technical preview
by upstream.
* Warning: For xfreerdp, new /long-option commandline interfaces
have replaced the old --long-option interfaces. Existing user
scripts need to migrate to the new interfaces to avoid breakages.
scripts need to migrate to the new interfaces to avoid
breakages.
For more details, see:
https://github.com/FreeRDP/FreeRDP/wiki/CommandLineInterface
* Add Network Level Ahthentication support.
@ -47,8 +51,7 @@ Wed May 4 12:06:22 UTC 2016 - fezhang@suse.com
Mon Jun 23 03:05:37 UTC 2014 - fezhang@suse.com
- Add freerdp-CVE-2014-0791.patch to fix bnc#857491
backported from upstream commit:
https://github.com/FreeRDP/FreeRDP/commit/f1d6afca6ae620f9855a33280bdc6f3ad9153be0#diff-b6d68bbca6e0f5875c57ef225cd65c45
backported from upstream commit f1d6afc
-------------------------------------------------------------------
Thu Jun 12 20:50:36 UTC 2014 - dliang@suse.com
@ -73,49 +76,53 @@ Thu Sep 12 07:03:02 UTC 2013 - crrodriguez@opensuse.org
-------------------------------------------------------------------
Thu Mar 7 09:10:15 UTC 2013 - bruno@ioda-net.ch
- Added patch for issue #811 fixing divide key (/) on keypad for 1.0x series
- Added patch for issue #811 fixing divide key (/) on keypad for
1.0x series,
commit https://github.com/bmiklautz/FreeRDP/commit/e0cc1e60657b5883a907e5da2f70eb27bf0b91f1
- Added changelog
FreeRDP 1.0.2 is a maintenance release which contains several bug and stability fixes.
* xfreerdp:
* new parameter --from-stdin - prompts for unspecified arguments username, password, domain and host.
* fix compability with x2go
* fix keyboard state in remote app
* documentation fixes
* fixed crash when started with --authonly (#843)
FreeRDP 1.0.2 is a maintenance release which contains several bug
and stability fixes.
* xfreerdp:
* new parameter --from-stdin - prompts for unspecified arguments
username, password, domain and host.
* fix compability with x2go
* fix keyboard state in remote app
* documentation fixes
* fixed crash when started with --authonly (#843)
* libfreerdp-core:
* several memory leaks and double frees were fixed
* support for FastPath PDUs up to 32767
* register audio only if plugin is registered
* load extensions after argument parsing
* libfreerdp-core:
* several memory leaks and double frees were fixed
* support for FastPath PDUs up to 32767
* register audio only if plugin is registered
* load extensions after argument parsing
* libfreerdp-utils:
* fixed crash when HOME environment variable wasn't set
* libfreerdp-utils:
* fixed crash when HOME environment variable wasn't set
* xfreerdp-server
* deadlock fixed
* accept TLSv1 and SSLv3
* xfreerdp-server:
* deadlock fixed
* accept TLSv1 and SSLv3
* smartcard
* don't incorrectly set SCARD_STATE_IGNORE
* smartcard:
* don't incorrectly set SCARD_STATE_IGNORE
* libfreerdp-codec
* performance improvement
* libfreerdp-codec:
* performance improvement
* libfreerdp-gdi
* support for PatBlt DPa operation
* libfreerdp-gdi:
* support for PatBlt DPa operation
* plugin
* ignore CHANNEL_FLAG_SUSPEND/CHANNEL_FLAG_RESUME to prevent possible crash
* plugin:
* ignore CHANNEL_FLAG_SUSPEND/CHANNEL_FLAG_RESUME to prevent
possible crash
For a detailed list of changes use "git log 1.0.1..1.0.2"
known problems:
For a detailed list of changes use "git log 1.0.1..1.0.2"
known problems:
* If windows input language is set to german pressing the divde key (/) on the keypad
results in minus (-) (see issue #811)
* If windows input language is set to german pressing the divde
key (/) on the keypad results in minus (-) (see issue #811)
-------------------------------------------------------------------
Thu Jan 24 14:42:37 UTC 2013 - kkaempf@suse.com
@ -240,17 +247,19 @@ Thu Sep 22 15:31:28 UTC 2011 - gber@opensuse.org
-------------------------------------------------------------------
Tue Jun 7 22:21:56 UTC 2011 - pascal.bleser@opensuse.org
- fix bnc#688484 by passing --with-sound=alsa and alsa-devel in BuildRequires
- fix bnc#688484 by passing --with-sound=alsa and alsa-devel in
BuildRequires
-------------------------------------------------------------------
Wed Nov 17 11:35:04 UTC 2010 - pascal.bleser@opensuse.org
- rewrote most of the spec file (wrong group, wrong subpackages, ldconfig
called on devel package, shlibs inj devel package, ...)
- rewrote most of the spec file (wrong group, wrong subpackages,
ldconfig called on devel package, shlibs inj devel package, ...)
- update to 0.8.2:
* libfreerdp:
+ fix buffer overflow when local timezone doesn't fit in 32 bytes
+ fix buffer overflow when local timezone doesn't fit in 32
bytes
+ fix data corruption after TLS license package
+ free TLS resources to avoid memory leaks
* mcs: